DE602004028316D1 - Reduce network configuration complexity with transparent, virtual networks - Google Patents
Reduce network configuration complexity with transparent, virtual networksInfo
- Publication number
- DE602004028316D1 DE602004028316D1 DE602004028316T DE602004028316T DE602004028316D1 DE 602004028316 D1 DE602004028316 D1 DE 602004028316D1 DE 602004028316 T DE602004028316 T DE 602004028316T DE 602004028316 T DE602004028316 T DE 602004028316T DE 602004028316 D1 DE602004028316 D1 DE 602004028316D1
- Authority
- DE
- Germany
- Prior art keywords
- client
- firewall
- server
- private network
- transparent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A firewall acts as a transparent gateway to a server within a private network by initiating an unsolicited challenge to a client to provide authentication credentials. After receiving the client's credentials, the firewall verifies the authentication credentials and establishes a secure channel for accessing the server. Data destined for the server from the client may be forwarded through the firewall using the secure channel. The firewall may sign, or otherwise indicate that data forwarded to the server is from a client that the firewall has authenticated. The firewall also may provide some level of authentication to the client. While connected to the server, the client may access other servers external to the private network without having the data associated with the other servers pass through the private network. The firewall reduces configuration information that a client otherwise must maintain to access various private network servers.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/611,832 US7305705B2 (en) | 2003-06-30 | 2003-06-30 | Reducing network configuration complexity with transparent virtual private networks |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602004028316D1 true DE602004028316D1 (en) | 2010-09-09 |
Family
ID=33435444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602004028316T Active DE602004028316D1 (en) | 2003-06-30 | 2004-06-21 | Reduce network configuration complexity with transparent, virtual networks |
Country Status (7)
Country | Link |
---|---|
US (1) | US7305705B2 (en) |
EP (1) | EP1494420B1 (en) |
JP (1) | JP4558389B2 (en) |
KR (1) | KR101076848B1 (en) |
CN (1) | CN1578218B (en) |
AT (1) | ATE476044T1 (en) |
DE (1) | DE602004028316D1 (en) |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8200577B2 (en) * | 2001-03-20 | 2012-06-12 | Verizon Business Global Llc | Systems and methods for retrieving and modifying data records for rating and billing purposes |
US20030115480A1 (en) * | 2001-12-17 | 2003-06-19 | Worldcom, Inc. | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks |
US8239917B2 (en) * | 2002-10-16 | 2012-08-07 | Enterprise Information Management, Inc. | Systems and methods for enterprise security with collaborative peer to peer architecture |
US7840806B2 (en) * | 2002-10-16 | 2010-11-23 | Enterprise Information Management, Inc. | System and method of non-centralized zero knowledge authentication for a computer network |
GB2414627A (en) * | 2004-05-27 | 2005-11-30 | Hewlett Packard Development Co | Network administration |
US7594259B1 (en) * | 2004-09-15 | 2009-09-22 | Nortel Networks Limited | Method and system for enabling firewall traversal |
US8250214B2 (en) * | 2004-12-20 | 2012-08-21 | Vmware, Inc. | System, method and computer program product for communicating with a private network |
US8261341B2 (en) * | 2005-01-27 | 2012-09-04 | Nokia Corporation | UPnP VPN gateway configuration service |
US20060235973A1 (en) * | 2005-04-14 | 2006-10-19 | Alcatel | Network services infrastructure systems and methods |
US8132005B2 (en) * | 2005-07-07 | 2012-03-06 | Nokia Corporation | Establishment of a trusted relationship between unknown communication parties |
US8166538B2 (en) * | 2005-07-08 | 2012-04-24 | Microsoft Corporation | Unified architecture for remote network access |
US20070033646A1 (en) * | 2005-08-05 | 2007-02-08 | Sierra Wireless, Inc. A Canadian Corp. | Suspension and resumption of secure data connection session |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
WO2007065146A2 (en) | 2005-12-02 | 2007-06-07 | Citrix Systems, Inc. | Method and apparatus for providing authentication credentials from a proxy server to a virtualized computing environment to access a remote resource |
US7614080B2 (en) * | 2005-12-28 | 2009-11-03 | Panasonic Electric Works Co., Ltd. | Systems and methods for providing secure access to embedded devices using a trust manager and a security broker |
KR100828372B1 (en) * | 2005-12-29 | 2008-05-08 | 삼성전자주식회사 | Method and apparatus for protecting servers from DOS attack |
WO2007092660A1 (en) * | 2006-02-06 | 2007-08-16 | Koninklijke Philips Electronics, N.V. | Usb-enabled audio-video switch |
US9781162B2 (en) * | 2006-02-15 | 2017-10-03 | International Business Machines Corporation | Predictive generation of a security network protocol configuration |
US8356171B2 (en) * | 2006-04-26 | 2013-01-15 | Cisco Technology, Inc. | System and method for implementing fast reauthentication |
US8213393B2 (en) | 2006-08-21 | 2012-07-03 | Citrix Systems, Inc. | Methods for associating an IP address to a user via an appliance |
US8418243B2 (en) * | 2006-08-21 | 2013-04-09 | Citrix Systems, Inc. | Systems and methods of providing an intranet internet protocol address to a client on a virtual private network |
US8451806B2 (en) * | 2006-08-21 | 2013-05-28 | Citrix Sysrems, Inc. | Systems and methods for pinging a user's intranet IP address |
US7788513B2 (en) | 2006-08-29 | 2010-08-31 | Hewlett-Packard Development Company, L.P. | Method of reducing power consumption of a computing system by evacuating selective platform memory components thereof |
GB0623101D0 (en) | 2006-11-20 | 2006-12-27 | British Telecomm | Secure network architecture |
US9009327B2 (en) * | 2007-08-03 | 2015-04-14 | Citrix Systems, Inc. | Systems and methods for providing IIP address stickiness in an SSL VPN session failover environment |
US8676998B2 (en) * | 2007-11-29 | 2014-03-18 | Red Hat, Inc. | Reverse network authentication for nonstandard threat profiles |
CN101222456A (en) * | 2008-01-28 | 2008-07-16 | 陈勇 | Network safety gateway product sharing method |
KR101022508B1 (en) * | 2009-03-30 | 2011-03-16 | 플러스기술주식회사 | Interception system of denial of service attack and distributed denial of service attack |
US20100325424A1 (en) * | 2009-06-19 | 2010-12-23 | Etchegoyen Craig S | System and Method for Secured Communications |
US10721269B1 (en) * | 2009-11-06 | 2020-07-21 | F5 Networks, Inc. | Methods and system for returning requests with javascript for clients before passing a request to a server |
CN102131189B (en) * | 2010-12-28 | 2014-11-12 | 中国电信股份有限公司 | Acquisition instrument, mobile supervision method and system |
CN102404334A (en) * | 2011-12-07 | 2012-04-04 | 山石网科通信技术(北京)有限公司 | Method and device for preventing denial of service attacks |
CN102611700B (en) * | 2012-02-24 | 2015-04-22 | 汉柏科技有限公司 | Method for realizing VPN (Virtual Private Network) access under transparent mode |
US9344403B2 (en) | 2013-03-15 | 2016-05-17 | Tempered Networks, Inc. | Industrial network security |
CN104378327B (en) * | 2013-08-12 | 2018-12-28 | 深圳市腾讯计算机系统有限公司 | Network attack protection method, apparatus and system |
WO2016019183A1 (en) * | 2014-07-30 | 2016-02-04 | Tempered Networks, Inc. | Performing actions via devices that establish a secure, private network |
US9148408B1 (en) | 2014-10-06 | 2015-09-29 | Cryptzone North America, Inc. | Systems and methods for protecting network devices |
US9300635B1 (en) | 2015-06-15 | 2016-03-29 | Tempered Networks, Inc. | Overlay network with position independent insertion and tap points |
WO2017007705A1 (en) | 2015-07-06 | 2017-01-12 | Shape Security, Inc. | Asymmetrical challenges for web security |
CN106357590A (en) * | 2015-07-15 | 2017-01-25 | 艾默生网络能源系统北美公司 | Network protocol conversion system, network protocol converter and network protocol conversion method |
US10003466B1 (en) * | 2015-09-15 | 2018-06-19 | Amazon Technologies, Inc. | Network traffic with credential signatures |
US9628444B1 (en) | 2016-02-08 | 2017-04-18 | Cryptzone North America, Inc. | Protecting network devices by a firewall |
US10412048B2 (en) | 2016-02-08 | 2019-09-10 | Cryptzone North America, Inc. | Protecting network devices by a firewall |
US9560015B1 (en) * | 2016-04-12 | 2017-01-31 | Cryptzone North America, Inc. | Systems and methods for protecting network devices by a firewall |
US9729581B1 (en) | 2016-07-01 | 2017-08-08 | Tempered Networks, Inc. | Horizontal switch scalability via load balancing |
KR102510868B1 (en) * | 2016-07-07 | 2023-03-16 | 삼성에스디에스 주식회사 | Method for authenticating client system, client device and authentication server |
US10630507B2 (en) * | 2016-11-29 | 2020-04-21 | Ale International | System for and method of establishing a connection between a first electronic device and a second electronic device |
CN108322366B (en) * | 2017-01-17 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Method, device and system for accessing network |
JP7148947B2 (en) * | 2017-06-07 | 2022-10-06 | コネクトフリー株式会社 | Network system and information processing equipment |
CN107465752B (en) * | 2017-08-22 | 2021-02-05 | 苏州浪潮智能科技有限公司 | Connection management method and device |
US10069726B1 (en) | 2018-03-16 | 2018-09-04 | Tempered Networks, Inc. | Overlay network identity-based relay |
KR101997847B1 (en) | 2018-04-26 | 2019-07-08 | (주)티에스이 | Interface board for testing semiconductor device using coolant |
KR102015395B1 (en) | 2018-05-15 | 2019-08-28 | (주)티에스이 | Interface board for testing semiconductor device |
US10116539B1 (en) | 2018-05-23 | 2018-10-30 | Tempered Networks, Inc. | Multi-link network gateway with monitoring and dynamic failover |
US10158545B1 (en) | 2018-05-31 | 2018-12-18 | Tempered Networks, Inc. | Monitoring overlay networks |
JP7467865B2 (en) * | 2019-10-01 | 2024-04-16 | 株式会社リコー | Information processing system and information processing method |
US10911418B1 (en) | 2020-06-26 | 2021-02-02 | Tempered Networks, Inc. | Port level policy isolation in overlay networks |
US11070594B1 (en) | 2020-10-16 | 2021-07-20 | Tempered Networks, Inc. | Applying overlay network policy based on users |
US10999154B1 (en) | 2020-10-23 | 2021-05-04 | Tempered Networks, Inc. | Relay node management for overlay networks |
WO2023000248A1 (en) * | 2021-07-22 | 2023-01-26 | Huawei Technologies Co., Ltd. | Authentication methods using zero-knowledge proof algorithms for user equipments and nodes implementing the authentication methods |
Family Cites Families (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2700430B1 (en) * | 1992-12-30 | 1995-02-10 | Jacques Stern | Method of authenticating at least one identification device by a verification device and device for its implementation. |
US5835726A (en) * | 1993-12-15 | 1998-11-10 | Check Point Software Technologies Ltd. | System for securing the flow of and selectively modifying packets in a computer network |
WO1997000471A2 (en) | 1993-12-15 | 1997-01-03 | Check Point Software Technologies Ltd. | A system for securing the flow of and selectively modifying packets in a computer network |
US5511122A (en) * | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US6631435B1 (en) * | 1996-02-02 | 2003-10-07 | Sony Corporation | Application programming interface for data transfer and bus management over a bus structure |
US5983350A (en) * | 1996-09-18 | 1999-11-09 | Secure Computing Corporation | Secure firewall supporting different levels of authentication based on address or encryption status |
US6009475A (en) * | 1996-12-23 | 1999-12-28 | International Business Machines Corporation | Filter rule validation and administration for firewalls |
IL132877A (en) * | 1997-05-13 | 2003-12-10 | Passlogix Inc | Generalized user identification and authentication system |
JP3655437B2 (en) * | 1997-07-10 | 2005-06-02 | 日本電信電話株式会社 | Personal identification method, security system main unit, and recording medium storing personal identification program |
US6230271B1 (en) * | 1998-01-20 | 2001-05-08 | Pilot Network Services, Inc. | Dynamic policy-based apparatus for wide-range configurable network service authentication and access control using a fixed-path hardware configuration |
US6141755A (en) * | 1998-04-13 | 2000-10-31 | The United States Of America As Represented By The Director Of The National Security Agency | Firewall security apparatus for high-speed circuit switched networks |
US6317838B1 (en) * | 1998-04-29 | 2001-11-13 | Bull S.A. | Method and architecture to provide a secured remote access to private resources |
JPH11328118A (en) * | 1998-05-19 | 1999-11-30 | Hitachi Ltd | User authenticating method and storage medium |
US6615358B1 (en) * | 1998-08-07 | 2003-09-02 | Patrick W. Dowd | Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network |
US6502135B1 (en) * | 1998-10-30 | 2002-12-31 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
WO2000027090A2 (en) * | 1998-10-30 | 2000-05-11 | Science Applications International Corporation | Network protocol for secure communications |
US7051365B1 (en) * | 1999-06-30 | 2006-05-23 | At&T Corp. | Method and apparatus for a distributed firewall |
US7058817B1 (en) * | 1999-07-02 | 2006-06-06 | The Chase Manhattan Bank | System and method for single sign on process for websites with multiple applications and services |
US6473863B1 (en) * | 1999-10-28 | 2002-10-29 | International Business Machines Corporation | Automatic virtual private network internet snoop avoider |
US6496935B1 (en) * | 2000-03-02 | 2002-12-17 | Check Point Software Technologies Ltd | System, device and method for rapid packet filtering and processing |
US6898710B1 (en) * | 2000-06-09 | 2005-05-24 | Northop Grumman Corporation | System and method for secure legacy enclaves in a public key infrastructure |
US6938157B2 (en) * | 2000-08-18 | 2005-08-30 | Jonathan C. Kaplan | Distributed information system and protocol for affixing electronic signatures and authenticating documents |
JP2002183008A (en) * | 2000-12-11 | 2002-06-28 | Sekisui House Ltd | Authentication device, firewall, terminal, server, authenticating method, and storage medium |
US6883095B2 (en) * | 2000-12-19 | 2005-04-19 | Singlesigon. Net Inc. | System and method for password throttling |
US7124189B2 (en) | 2000-12-20 | 2006-10-17 | Intellisync Corporation | Spontaneous virtual private network between portable device and enterprise network |
US6931529B2 (en) * | 2001-01-05 | 2005-08-16 | International Business Machines Corporation | Establishing consistent, end-to-end protection for a user datagram |
US6959336B2 (en) * | 2001-04-07 | 2005-10-25 | Secure Data In Motion, Inc. | Method and system of federated authentication service for interacting between agent and client and communicating with other components of the system to choose an appropriate mechanism for the subject from among the plurality of authentication mechanisms wherein the subject is selected from humans, client applications and applets |
US7020645B2 (en) * | 2001-04-19 | 2006-03-28 | Eoriginal, Inc. | Systems and methods for state-less authentication |
JP3724564B2 (en) * | 2001-05-30 | 2005-12-07 | 日本電気株式会社 | Authentication system, authentication method, and authentication program |
US7216173B2 (en) * | 2001-06-12 | 2007-05-08 | Varian Medical Systems Technologies, Inc. | Virtual private network software system |
US6834795B1 (en) * | 2001-06-29 | 2004-12-28 | Sun Microsystems, Inc. | Secure user authentication to computing resource via smart card |
JP2003030063A (en) * | 2001-07-16 | 2003-01-31 | Mitsubishi Electric Corp | System and method of oa management |
US7827278B2 (en) * | 2001-07-23 | 2010-11-02 | At&T Intellectual Property Ii, L.P. | System for automated connection to virtual private networks related applications |
US20030046587A1 (en) * | 2001-09-05 | 2003-03-06 | Satyam Bheemarasetti | Secure remote access using enterprise peer networks |
US20030046586A1 (en) * | 2001-09-05 | 2003-03-06 | Satyam Bheemarasetti | Secure remote access to data between peers |
CN1268088C (en) * | 2001-11-29 | 2006-08-02 | 东南大学 | PKI-based VPN cipher key exchange implementing method |
EP1339199A1 (en) * | 2002-02-22 | 2003-08-27 | Hewlett-Packard Company | Dynamic user authentication |
US20030177390A1 (en) * | 2002-03-15 | 2003-09-18 | Rakesh Radhakrishnan | Securing applications based on application infrastructure security techniques |
US7143174B2 (en) * | 2002-06-12 | 2006-11-28 | The Jpmorgan Chase Bank, N.A. | Method and system for delayed cookie transmission in a client-server architecture |
US6954862B2 (en) * | 2002-08-27 | 2005-10-11 | Michael Lawrence Serpa | System and method for user authentication with enhanced passwords |
US7644433B2 (en) * | 2002-12-23 | 2010-01-05 | Authernative, Inc. | Authentication system and method based upon random partial pattern recognition |
US7073067B2 (en) * | 2003-05-07 | 2006-07-04 | Authernative, Inc. | Authentication system and method based upon random partial digitized path recognition |
-
2003
- 2003-06-30 US US10/611,832 patent/US7305705B2/en not_active Expired - Fee Related
-
2004
- 2004-06-21 EP EP04014497A patent/EP1494420B1/en not_active Not-in-force
- 2004-06-21 AT AT04014497T patent/ATE476044T1/en not_active IP Right Cessation
- 2004-06-21 DE DE602004028316T patent/DE602004028316D1/en active Active
- 2004-06-29 KR KR1020040049692A patent/KR101076848B1/en not_active IP Right Cessation
- 2004-06-30 CN CN2004100632440A patent/CN1578218B/en not_active Expired - Fee Related
- 2004-06-30 JP JP2004194757A patent/JP4558389B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1578218B (en) | 2010-12-08 |
JP2005027312A (en) | 2005-01-27 |
EP1494420B1 (en) | 2010-07-28 |
US20040268121A1 (en) | 2004-12-30 |
EP1494420A2 (en) | 2005-01-05 |
EP1494420A3 (en) | 2006-06-07 |
ATE476044T1 (en) | 2010-08-15 |
US7305705B2 (en) | 2007-12-04 |
KR101076848B1 (en) | 2011-10-25 |
CN1578218A (en) | 2005-02-09 |
JP4558389B2 (en) | 2010-10-06 |
KR20050002632A (en) | 2005-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602004028316D1 (en) | Reduce network configuration complexity with transparent, virtual networks | |
ATE437515T1 (en) | SECURE COMBINATION OF DATA NETWORKS | |
Wu et al. | Introduction to computer networks and cybersecurity | |
US7590761B2 (en) | Secure gateway with alarm manager and support for inbound federated identity | |
US11665171B2 (en) | Secure access to a corporate web application with translation between an internal address and an external address | |
GB0122276D0 (en) | Managed access to data over data networks | |
WO2007127485A3 (en) | Providing guest users access to network resources through an enterprise network | |
WO2005062989A3 (en) | Authentication system for networked computer applications | |
TW200420071A (en) | System and method for using virtual local area network tags with a virtual private network | |
GB2464552B (en) | Authentication system and method for authenticating a user terminal with an access node providing restricted access to a communication network | |
HK1066123A1 (en) | Methods and systems for authentication of a user for sub-locations of a network location | |
BRPI0509900A (en) | system and method for automatically initiating and dynamically establishing secure internet connections between a protection barrier server and a protection barrier client | |
WO2006118829A3 (en) | Preventing fraudulent internet account access | |
AU2003239059A1 (en) | An arrangement and a method relating to ip network access | |
ATE413653T1 (en) | DATA COMMUNICATION PROTOCOL | |
WO2006101667A3 (en) | Authenticating an endpoint using a stun server | |
DE602004005277D1 (en) | Procedure for legal entity sharing between users | |
DE60321834D1 (en) | PERSONALIZED FIREWALL | |
EP1724701A3 (en) | Solution to the malware problems of the internet | |
JP2009163546A (en) | Gateway, repeating method and program | |
CN106027565A (en) | PPPOE (Point-to-Point Protocol over Ethernet)-based Intranet-Extranet uniform authentication method and device | |
DK1624639T3 (en) | SIM based authentication | |
US20120106399A1 (en) | Identity management system | |
Melzer et al. | Network approaches to improving consumer IoT security | |
ATE313893T1 (en) | USER PASSWORD BASED PACKET SHIPPING IN VIRTUAL PRIVATE NETWORKS |